Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security model oriented attestation on dynamically reconfigurable component-based systems., , , , and . J. Network and Computer Applications, 35 (3): 974-981 (2012)Detecting Malicious Behaviors in JavaScript Applications., , , , , , and . IEEE Access, (2018)TwiInsight: Discovering Topics and Sentiments from Social Media Datasets., , , , and . CoRR, (2017)Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications., , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 349-369. Springer, (2018)LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking., , , , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 299-318. Springer, (2019)Break the dead end of dynamic slicing: localizing data and control omission bug., , , , , and . ASE, page 509-519. ACM, (2018)Formal Analysis of a Proof-of-Stake Blockchain., , , and . ICECCS, page 197-200. IEEE Computer Society, (2018)HOMESCAN: Scrutinizing Implementations of Smart Home Integrations., , , , , and . ICECCS, page 21-30. IEEE Computer Society, (2018)DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts., , , , , and . ICECCS, page 125-134. IEEE, (2020)AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations., , , , , , , and . NDSS, The Internet Society, (2013)